关注
Jeehyeong Kim
标题
引用次数
引用次数
年份
Recent advances in smart contracts: A technical overview and state of the art
VY Kemmoe, W Stone, J Kim, D Kim, J Son
IEEE Access 8, 117782-117801, 2020
962020
Digestive neural networks: A novel defense strategy against inference attacks in federated learning
H Lee, J Kim, S Ahn, R Hussain, S Cho, J Son
computers & security 109, 102378, 2021
552021
Autonomous power allocation based on distributed deep learning for device-to-device communication underlaying cellular network
J Kim, J Park, J Noh, S Cho
IEEE access 8, 107853-107864, 2020
38*2020
Bluetooth low energy security vulnerability and improvement method
G Kwon, J Kim, J Noh, S Cho
2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-4, 2016
352016
Explaining deep learning-based traffic classification using a genetic algorithm
S Ahn, J Kim, SY Park, S Cho
IEEE Access 9, 4738-4751, 2020
332020
An interference mitigation scheme of device-to-device communications for sensor networks underlying LTE-A
J Kim, NA Karim, S Cho
Sensors 17 (5), 1088, 2017
282017
Secure authentication and four-way handshake scheme for protected individual communication in public wi-fi networks
J Noh, J Kim, S Cho
IEEE Access 6, 16539-16548, 2018
222018
REACH: An efficient MAC protocol for RF energy harvesting in wireless sensor network
T Kim, J Park, J Kim, J Noh, S Cho
Wireless Communications and Mobile Computing 2017 (1), 6438726, 2017
202017
Secure key exchange scheme for WPA/WPA2-PSK using public key cryptography
J Noh, J Kim, G Kwon, S Cho
2016 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia), 1-4, 2016
202016
Fractional frequency reuse scheme for device to device communication underlaying cellular on wireless multimedia sensor networks
J Kim, T Kim, J Noh, S Cho
Sensors 18 (8), 2661, 2018
192018
On defensive neural networks against inference attack in federated learning
H Lee, J Kim, R Hussain, S Cho, J Son
ICC 2021-IEEE International Conference on Communications, 1-6, 2021
122021
Grant-free resource allocation for NOMA V2X uplink systems using a genetic algorithm approach
S Lee, J Kim, J Park, S Cho
Electronics 9 (7), 1111, 2020
112020
Resource allocation for NOMA based D2D system using genetic algorithm with continuous pool
S Lee, J Kim, S Cho
2019 International Conference on Information and Communication Technology …, 2019
112019
A novel resource allocation scheme for NOMA-V2X-Femtocell with channel aggregation
J Kim, J Son, W Stone, H Kim, J Noh, S Cho
GLOBECOM 2020-2020 IEEE Global Communications Conference, 1-6, 2020
52020
SuperB: superior behavior-based anomaly detection defining authorized users’ traffic patterns
DY Karasek, J Kim, VY Kemmoe, MZA Bhuiyan, S Cho, J Son
2020 29th International Conference on Computer Communications and Networks …, 2020
22020
Strong privacy preserving authentication scheme for unmanned cars
S Jeon, J Noh, J Kim, S Cho
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-4, 2018
22018
Lightweight smart home security system using multiple RSS-based voting
T Kim, J Kim, J Noh, S Cho
2018 IEEE International Conference on Consumer Electronics (ICCE), 1-4, 2018
12018
Efficient yet Robust Privacy Preservation for MPEG‐DASH‐Based Video Streaming
L Cranfill, J Kim, H Lee, VY Kemmoe, S Cho, J Son
Security and Communication Networks 2021 (1), 4702469, 2021
2021
Rogue Access Point Detection Using Peripheral Beacon Frame Cyclical Fingerprint in Real-time
J Kim, J Noh, J Park, S Cho
대한전자공학회 학술대회, 490-493, 2017
2017
A Study on the Security Vulnerability of Bluetooth Low Energy and Improvement Method
조성현
2017 International Conference on Electronics, Information, and Communication …, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–20